Kenna Blog
Thoughtful perspectives on Modern Vulnerability Management.
Power Couple: Kenna’s Vulnerability Intel + ServiceNow Vulnerability Response
Every once in a while, two things come together and create something new. Abbott and Costello. Johnny and June. Fred and Ginger. The whole becomes greater than the sum of its parts.
Read MoreSign up to get the latest updates
Industry
RSA 2022 is Almost Here! Come Meet Us.
It’s hard to believe, but the RSA Conference 2022 is almost here. Join us to discuss real-world, cutting-edge solutions for our industry.
READ MORE
Trending Vulns
May Vuln of the Month: CVE-2022-22954
CVE-2022-22954 is a remote code execution (RCE) vulnerability in VMware’s identity management service being exploited by state actors
READ MORE
Blog
Without Risk-Based Prioritization, Security Resilience Will Be Elusive
Enterprises are taking swift action to evolve their security operations, protect their business, and respond to change confidently.
READ MORE
Cybersecurity Best Practices
What Star Wars Teaches Us About Risk Management
Here's what Star Wars can teach us about tapping into your security resilience and gaining ground in the battle against hacker forces.
READ MORE
Risk-Based Vulnerability Management
Listing Unique Asset Tags: Part One
For May, the API Guy overviews how to list unique asset tags and metadata to count the usage of each asset.
READ MORE
Cybersecurity Best Practices
Eliminate the Friction Between IT and Security
When the friction between IT and security is reduced or eliminated, it allows them to work toward common goals, not against each other.
READ MORE
5 Things Every CIO Should Know About VM
Read this eBook to learn what a modern vulnerability management approach means to your IT operation. You discover how it helps CIOs like you create more efficient and effective teams while reducing your company’s overall risk profile.
Download NowCustomer
7 CS Trends You Should Be Watching Now
There are 7 trends to keep in mind when building a strong Customer Service organization for enterprise-class customers.
READ MORE
Customer
4 Ways to Rethink Planning for and Responding to Extreme Vulnerabilities
Key takeaways from a conversation between Ed Bellis and Doug DeMio outlining the best ways to tackle extreme vulnerabilities.
READ MORE
Risk-Based Vulnerability Management
The State of Risk-Based Vulnerability Management in 2022
Kenna Security customers who bought into the risk-based vulnerability management (RBVM) strategy has proven itself year over year.
READ MORE
Cybersecurity Best Practices
Why Hasn’t Cybersecurity Been Automated?
Remediation teams are faced with increasing threats and finite resources, so why is cybersecurity automation lagging? Ed Bellis weighs in.
READ MORE
Trending Vulns
April Vuln of the Month: CVE-2022-1096
Our April Vuln of the Month is our first “Pre-NVD” vulnerability--it exists but has not been added to the official MITRE or NVD database.
READ MORE
Vulnerability Remediation
Remediate Based on Risk with Cisco Secure Endpoint & Kenna
The Kenna risk score now enables Cisco Secure Endpoint users to see helpful data points and views for computers running Windows 10.
READ MORE